Hongji Yang - Academia.edu (original) (raw)

Papers by Hongji Yang

Research paper thumbnail of Pre-processing COBOL Programs for Reverse Engineering in A Software Maintenance Tool

Object-Oriented Technology and Computing Systems Re-engineering, 1999

The Maintainer's Assistant is an interactive software maintenance tool which helps the user to ex... more The Maintainer's Assistant is an interactive software maintenance tool which helps the user to extract a specification from an existing source code program. It is based on a program transformation system, in which a program is converted to a semantically equivalent form using proven transformations selected from a catalogue. This paper describes an environmental support tool, the COBOL pre-processor, for the Maintainer's Assistant. The requirements of the tool are stated and the technical methods used in the tool are summarised. The current implementation is then described and results achieved discussed. Finally, both the research into the tool and the experience obtained via implementing the tool are summarised.

Research paper thumbnail of IRWoZ: Constructing an Industrial Robot Wizard-of-OZ Dialoguing Dataset

IEEE Access

Enabling a flexible and natural human-robot interaction (HRI) for industrial robots is a critical... more Enabling a flexible and natural human-robot interaction (HRI) for industrial robots is a critical yet challenging task that can be facilitated by the use of conversational artificial intelligence (AI). Prior research has concentrated on strengthening interactions through the deployment of social robots, while disregarding the capabilities required to boost the flexibility and user experience associated with human-robot collaboration (HRC) on manufacturing tasks. One of the main challenges is the lack of publicly available industrial-oriented dialogue datasets for the training of conversational AI. In this work, we present an Industrial Robot Wizard-of-Oz Dialoguing Dataset (IRWoZ) focused on enabling HRC in manufacturing tasks. The dataset covers four domains: assembly, transportation, position, and relocation. It is created using the Wizard-of-Oz technique to be less noisy. We manually constructed, annotated and validated dialogue segments (e.g., intentions, slots, annotations), as well as the responses. Building upon the proposed dataset, we benchmark it on the state-of-the-art (SoTA) language models, generative pretrained (GPT-2) models, on dialogue state tracking and response generation tasks. We expect that the IRWoZ dataset will facilitate exciting ongoing dialogue research and we provide it freely accessible at https://github.com/lcroy/ToD4IR/tree/main/dataset.

Research paper thumbnail of Using Aspect Orientation in Understanding Legacy COBOL Code

31st Annual International Computer Software and Applications Conference - Vol. 2 - (COMPSAC 2007), 2007

Research paper thumbnail of Privacy protection by typing in ubiquitous computing systems

Journal of Systems and Software, 2016

Ubiquitous computing systems collect and share a great deal of information upon the users and the... more Ubiquitous computing systems collect and share a great deal of information upon the users and their environment; including private or highly sensitive personal information. Unless users are confident enough that their privacy is protected, many will be deterred from using such systems. This paper proposes a privacy type system that controls the behaviour of concurrent, context-aware and mobile processes to ensure that private information is not accidentally disclosed. We prove the subject reduction property and the soundness of the proposed type system; which guarantee that a well-typed process cannot accidentally disclose private information. We demonstrate the pragmatics of our approach with a case study.

Research paper thumbnail of TIME Committee Organisation

Research paper thumbnail of Towards an ontology of software maintenance

Journal of Software Maintenance: Research and Practice, 1999

We suggest that empirical studies of maintenance are difficult to understand unless the context o... more We suggest that empirical studies of maintenance are difficult to understand unless the context of the study is fully defined. We developed a preliminary ontology to identify a number of factors that influence maintenance. The purpose of the ontology is to identify factors that would affect the results of empirical studies. We present the ontology in the form of a UML model. Using the maintenance factors included in the ontology, we define two common maintenance scenarios and consider the industrial issues associated with them.

Research paper thumbnail of Integrating structured OO approaches with formal techniques for the development of real-time systems

Information and Software Technology, 1999

The use of formal methods in the development of time-critical applications is essential if we wan... more The use of formal methods in the development of time-critical applications is essential if we want to achieve a high level of assurance in them. However, these methods have not yet been widely accepted in industry as compared to the more established structured and informal techniques. A reliable linkage between these two techniques will provide the developer with a powerful tool for developing a provably correct system. In this paper, we explore the issue of integrating a real-time formal technique, TAM (Temporal Agent Model), with an industry-strength structured methodology known as HRT-HOOD. TAM is a systematic formal approach for the development of real-time systems based on the refinement calculus. Within TAM, a formal specification can be written (in a logic-based formalism), analysed and then refined to concrete representation through successive applications of sound refinement laws. Both abstract specification and concrete implementation are allowed to freely intermix. HRT-HOOD is an extension to the Hierarchical Object-Oriented Design (HOOD) technique for the development of Hard Real-Time systems. It is a two-phase design technique dealing with the logical and physical architecture designs of the system which can handle both functional and non-functional requirement, respectively. The integrated technique is illustrated on a version of the mine control system.

Research paper thumbnail of A Creative Approach to Reducing Ambiguity In Scenario-based Software Architecture Analysis

International Journal of Automation and Computing, 2018

In software engineering, a scenario describes an anticipated usage of a software system. As scena... more In software engineering, a scenario describes an anticipated usage of a software system. As scenarios are useful to understand the requirements and functionalities of a software system, the scenario-based analysis is widely used in various tasks, especially in the design stage of software architectures. Although researchers have proposed various scenariobased approaches to analyse software architecture, there are still limitations in this research field, and a key limitation lies in that scenarios are typically not formally defined and thus may contain ambiguities. As these ambiguities may lead to defects, it is desirable to reduce them as many as possible. In order to reduce ambiguity in scenario-based software architecture analysis, this paper introduces a creative computing approach to scenariobased software requirements analysis. Our work expends this idea in three directions. Firstly, we extend an ADL-based language-Breeze/ADL to model the software architecture. Secondly, we use a creative rule-Combinational Rule (CR) to combine the vector clock algorithm for reducing the ambiguities in modeling scenarios. Then, another creative rule-Transformational Rule (TR) is employed to help to transform our Breeze/ADL model to a popular model-UML model. We implement our approach as a plugin of Breeze, and illustrate a running example of modeling a poetry to music system in our case study. Our results show the proposed creative approach is able to reduce ambiguities of the software architecture in practice.

Research paper thumbnail of Dynamic slicing object-oriented programs for debugging

Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation

Dynamic program slicing is an effective technique for narrowing the errors to the relevant parts ... more Dynamic program slicing is an effective technique for narrowing the errors to the relevant parts of a program when debugging. Given a slicing criterion, the dynamic slice contains only those statements that actually affect the variables in the slicing criterion. This paper proposes a method to dynamically slice object-oriented (OO) programs based on dependence analysis. It uses the object program dependence graph and other static information to reduce the information to be traced during program execution. It deals with OO features such as inheritance, polymorphism and dynamic bindings. Based on this model, we present methods to slice methods, objects and classes. We also modify the slicing criterion to fit for debugging.

Research paper thumbnail of A hybrid multilayer error control technique for multihop ATM networks

ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220)

Acquisitions et BiMiographic Senrices services bibliographiques The author has granted a nonexclu... more Acquisitions et BiMiographic Senrices services bibliographiques The author has granted a nonexclusive licence diowing the Naîional Library of Canada to reproduce, loan, distxibute or seU copies of this thesis in microfonn, paper or electronic fonnats. The author retains ownership of the copyright in this thesis. Neither the thesis nor substantial extracts fkom it may be printed or othenvise reproduced without the author's pemiission. L'auteur a accordé une licence non exclusive permettant a la Biblothèque nationale du Canada de reproduire, prêter, distribuer ou vendre des copies de cette thèse sous la forme de microfiche/film, de reproduction sur papier ou sur format électronique. L'auteur conserve la propriété du &oit d'auteur qui protège cette thèse. Ni la thèse ni des extraits substantiels de celle-ci ne doivent être imprimés ou autrement reproduits sans son autorisation.

Research paper thumbnail of Performance of ATM networks under hybrid ARQ/FEC error control scheme

IEEE/ACM Transactions on Networking, 1999

Research paper thumbnail of An affinity analysis based CIM-to-PIM transformation

Multiagent and Grid Systems, 2017

To tackle the problems such as the imperfection and inconsistency in software requirements in tra... more To tackle the problems such as the imperfection and inconsistency in software requirements in traditional Computation Independent Model (CIM) modelling, the low degree of automation as well as the imperfection in the description of Platform Independent Model (PIM) in CIM-to-PIM transforming, in this article, we propose a Business-Process-based CIM modelling method and a CIM-to-PIM transformation approach. Business Process Model is used to express CIM, and UML`s Sequence Diagram, State Chart Diagram as well as Class Diagram are used to express PIM. Firstly, the users' requirements are obtained through business process models. We extract use cases from business processes and create use case specifications. A verification mechanism is also added for the use case specification. Secondly, we transform CIMs into PIMs automatically with use case specifications as the inputs as well as combining with use case based thinking, responsibility based thinking and affinity analysis. Finally, by comparing with the methods in other studies, we conclude that methods proposed in this article can ensure model integrity and increase the degree of model transformation automation.

Research paper thumbnail of Unlocking the Power of OPNET Modeler: Introduction

Research paper thumbnail of A transformation system for maintenance-turning theory into practice

Proceedings Conference on Software Maintenance 1992

A Transformation System for Maintenance - Turning Theory into Practice ... Keith Bennett Tim Bull... more A Transformation System for Maintenance - Turning Theory into Practice ... Keith Bennett Tim Bull Hongji Yang University of Durham England +44 091 386 0420 ... Abstract This paper provides an outline of the prin-ciples and design features of the Maintainer's Assistant. The main ...

Research paper thumbnail of Kestrel-based Search Algorithm (KSA) and Long Short Term Memory (LSTM) Network for feature selection in classification of high-dimensional bioinformatics datasets

Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018

Although deep learning methods have been applied to the selection of features in the classificati... more Although deep learning methods have been applied to the selection of features in the classification problem, current methods of learning parameters to be used in the classification approach can vary in terms of accuracy at each time interval, resulting in potentially inaccurate classification. To address this challenge, this study proposes an approach to learning these parameters by using two different aspects of Kestrel bird behavior to adjust the learning rate until the optimal value of the parameter is found: random encircling from a hovering position and learning through imitation from the well-adapted behaviour of other Kestrels. Additionally, deep learning method (that is, recurrent neural network with long short term memory network) was applied to select features and the accuracy of classification. A benchmark dataset (with continuous data attributes) was chosen to test the proposed search algorithm. The results showed that KSA is comparable to BAT, ACO and PSO as the test statistics (that is, Wilcoxon signed rank test) show no statistically significant differences between the mean of classification accuracy at level of significance of 0.05. However, KSA, when compared with WSA-MP, shows a statistically significant difference between the mean of classification accuracy. Index Terms-kestrel-based search algorithm, deep learning, random encircling, long short term memory network.

Research paper thumbnail of A Three-Dimensional Approach to Evolving Software

2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, 2013

Computing paradigms are becoming ubiquitous and complex in computing tasks, as a computing enviro... more Computing paradigms are becoming ubiquitous and complex in computing tasks, as a computing environment is changing from one dimension to three dimensions to reflect computing tasks changing from scientific computing to ubiquitous computing. By the same principle, software evolution approach should also be a three-dimensional one. Hence a three-dimensional evolution approach is proposed by addressing the relationships among software functions, software qualities and software models. Experiments were carried out to prove the proposed concept, which projects a number of concluding remarks for this study.

Research paper thumbnail of An approach to supporting architecture evolution in Internetware

Proceedings of the Fourth Asia-Pacific Symposium on Internetware - Internetware '12, 2012

ABSTRACT In order to take advantage the Internetware paradigm, software architecture is important... more ABSTRACT In order to take advantage the Internetware paradigm, software architecture is important research subject. Software architecture is the core of software systems and acts as a guideline for many development activities. Currently, not many approaches support the self-adaptability of architecture in Internetware. In this paper, an approach to evolving the software architecture in Internetware is presented, consisting of (1) representing source architecture via graph description and discussing the impact of qualities and functions on architecture, (2) transforming it into the new style via transformation techniques through the verified rules, (3) regenerating the code of the target architecture through the FermaT workbench, and (4) proposing a runtime supporting evolution environment for Internetware based systems.

Research paper thumbnail of A Business-Logic Based Framework for Evolving Software Systems

2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009

In the current competitive market to improve their business processes to act in accordance with t... more In the current competitive market to improve their business processes to act in accordance with the rapid changes. This evolution of the business process normally leads to a change in the employed software systems.Software evolution in general is a lengthy and costly task especially when the documentation of a system is lost, out-dated or unavailable. In this paper a business-logic-based

Research paper thumbnail of Extension of a transformation system for maintenance: dealing with data-intensive programs

Proceedings International Conference on Software Maintenance ICSM-94, 1994

Abstract This paper, following the theme set out in our paper “A Transformation System for Mainte... more Abstract This paper, following the theme set out in our paper “A Transformation System for Maintenance - Turning Theory into Prac-tice” presented in this conference in 1992 [2] - provides more results of the research programme on reverse engineering. It con-centrates on dealing with ...

Research paper thumbnail of Acquisition of ERA models from data intensive code

Proceedings of International Conference on Software Maintenance, 1995

Abstract We describe a solution to the acquisition of Entity Relationship Attribute (ERA) di-agra... more Abstract We describe a solution to the acquisition of Entity Relationship Attribute (ERA) di-agrams from data-intensive source code. In such programs, relationships between data items are often represented within imperative code, as well as within data structures, and we show that ...

Research paper thumbnail of Pre-processing COBOL Programs for Reverse Engineering in A Software Maintenance Tool

Object-Oriented Technology and Computing Systems Re-engineering, 1999

The Maintainer's Assistant is an interactive software maintenance tool which helps the user to ex... more The Maintainer's Assistant is an interactive software maintenance tool which helps the user to extract a specification from an existing source code program. It is based on a program transformation system, in which a program is converted to a semantically equivalent form using proven transformations selected from a catalogue. This paper describes an environmental support tool, the COBOL pre-processor, for the Maintainer's Assistant. The requirements of the tool are stated and the technical methods used in the tool are summarised. The current implementation is then described and results achieved discussed. Finally, both the research into the tool and the experience obtained via implementing the tool are summarised.

Research paper thumbnail of IRWoZ: Constructing an Industrial Robot Wizard-of-OZ Dialoguing Dataset

IEEE Access

Enabling a flexible and natural human-robot interaction (HRI) for industrial robots is a critical... more Enabling a flexible and natural human-robot interaction (HRI) for industrial robots is a critical yet challenging task that can be facilitated by the use of conversational artificial intelligence (AI). Prior research has concentrated on strengthening interactions through the deployment of social robots, while disregarding the capabilities required to boost the flexibility and user experience associated with human-robot collaboration (HRC) on manufacturing tasks. One of the main challenges is the lack of publicly available industrial-oriented dialogue datasets for the training of conversational AI. In this work, we present an Industrial Robot Wizard-of-Oz Dialoguing Dataset (IRWoZ) focused on enabling HRC in manufacturing tasks. The dataset covers four domains: assembly, transportation, position, and relocation. It is created using the Wizard-of-Oz technique to be less noisy. We manually constructed, annotated and validated dialogue segments (e.g., intentions, slots, annotations), as well as the responses. Building upon the proposed dataset, we benchmark it on the state-of-the-art (SoTA) language models, generative pretrained (GPT-2) models, on dialogue state tracking and response generation tasks. We expect that the IRWoZ dataset will facilitate exciting ongoing dialogue research and we provide it freely accessible at https://github.com/lcroy/ToD4IR/tree/main/dataset.

Research paper thumbnail of Using Aspect Orientation in Understanding Legacy COBOL Code

31st Annual International Computer Software and Applications Conference - Vol. 2 - (COMPSAC 2007), 2007

Research paper thumbnail of Privacy protection by typing in ubiquitous computing systems

Journal of Systems and Software, 2016

Ubiquitous computing systems collect and share a great deal of information upon the users and the... more Ubiquitous computing systems collect and share a great deal of information upon the users and their environment; including private or highly sensitive personal information. Unless users are confident enough that their privacy is protected, many will be deterred from using such systems. This paper proposes a privacy type system that controls the behaviour of concurrent, context-aware and mobile processes to ensure that private information is not accidentally disclosed. We prove the subject reduction property and the soundness of the proposed type system; which guarantee that a well-typed process cannot accidentally disclose private information. We demonstrate the pragmatics of our approach with a case study.

Research paper thumbnail of TIME Committee Organisation

Research paper thumbnail of Towards an ontology of software maintenance

Journal of Software Maintenance: Research and Practice, 1999

We suggest that empirical studies of maintenance are difficult to understand unless the context o... more We suggest that empirical studies of maintenance are difficult to understand unless the context of the study is fully defined. We developed a preliminary ontology to identify a number of factors that influence maintenance. The purpose of the ontology is to identify factors that would affect the results of empirical studies. We present the ontology in the form of a UML model. Using the maintenance factors included in the ontology, we define two common maintenance scenarios and consider the industrial issues associated with them.

Research paper thumbnail of Integrating structured OO approaches with formal techniques for the development of real-time systems

Information and Software Technology, 1999

The use of formal methods in the development of time-critical applications is essential if we wan... more The use of formal methods in the development of time-critical applications is essential if we want to achieve a high level of assurance in them. However, these methods have not yet been widely accepted in industry as compared to the more established structured and informal techniques. A reliable linkage between these two techniques will provide the developer with a powerful tool for developing a provably correct system. In this paper, we explore the issue of integrating a real-time formal technique, TAM (Temporal Agent Model), with an industry-strength structured methodology known as HRT-HOOD. TAM is a systematic formal approach for the development of real-time systems based on the refinement calculus. Within TAM, a formal specification can be written (in a logic-based formalism), analysed and then refined to concrete representation through successive applications of sound refinement laws. Both abstract specification and concrete implementation are allowed to freely intermix. HRT-HOOD is an extension to the Hierarchical Object-Oriented Design (HOOD) technique for the development of Hard Real-Time systems. It is a two-phase design technique dealing with the logical and physical architecture designs of the system which can handle both functional and non-functional requirement, respectively. The integrated technique is illustrated on a version of the mine control system.

Research paper thumbnail of A Creative Approach to Reducing Ambiguity In Scenario-based Software Architecture Analysis

International Journal of Automation and Computing, 2018

In software engineering, a scenario describes an anticipated usage of a software system. As scena... more In software engineering, a scenario describes an anticipated usage of a software system. As scenarios are useful to understand the requirements and functionalities of a software system, the scenario-based analysis is widely used in various tasks, especially in the design stage of software architectures. Although researchers have proposed various scenariobased approaches to analyse software architecture, there are still limitations in this research field, and a key limitation lies in that scenarios are typically not formally defined and thus may contain ambiguities. As these ambiguities may lead to defects, it is desirable to reduce them as many as possible. In order to reduce ambiguity in scenario-based software architecture analysis, this paper introduces a creative computing approach to scenariobased software requirements analysis. Our work expends this idea in three directions. Firstly, we extend an ADL-based language-Breeze/ADL to model the software architecture. Secondly, we use a creative rule-Combinational Rule (CR) to combine the vector clock algorithm for reducing the ambiguities in modeling scenarios. Then, another creative rule-Transformational Rule (TR) is employed to help to transform our Breeze/ADL model to a popular model-UML model. We implement our approach as a plugin of Breeze, and illustrate a running example of modeling a poetry to music system in our case study. Our results show the proposed creative approach is able to reduce ambiguities of the software architecture in practice.

Research paper thumbnail of Dynamic slicing object-oriented programs for debugging

Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation

Dynamic program slicing is an effective technique for narrowing the errors to the relevant parts ... more Dynamic program slicing is an effective technique for narrowing the errors to the relevant parts of a program when debugging. Given a slicing criterion, the dynamic slice contains only those statements that actually affect the variables in the slicing criterion. This paper proposes a method to dynamically slice object-oriented (OO) programs based on dependence analysis. It uses the object program dependence graph and other static information to reduce the information to be traced during program execution. It deals with OO features such as inheritance, polymorphism and dynamic bindings. Based on this model, we present methods to slice methods, objects and classes. We also modify the slicing criterion to fit for debugging.

Research paper thumbnail of A hybrid multilayer error control technique for multihop ATM networks

ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220)

Acquisitions et BiMiographic Senrices services bibliographiques The author has granted a nonexclu... more Acquisitions et BiMiographic Senrices services bibliographiques The author has granted a nonexclusive licence diowing the Naîional Library of Canada to reproduce, loan, distxibute or seU copies of this thesis in microfonn, paper or electronic fonnats. The author retains ownership of the copyright in this thesis. Neither the thesis nor substantial extracts fkom it may be printed or othenvise reproduced without the author's pemiission. L'auteur a accordé une licence non exclusive permettant a la Biblothèque nationale du Canada de reproduire, prêter, distribuer ou vendre des copies de cette thèse sous la forme de microfiche/film, de reproduction sur papier ou sur format électronique. L'auteur conserve la propriété du &oit d'auteur qui protège cette thèse. Ni la thèse ni des extraits substantiels de celle-ci ne doivent être imprimés ou autrement reproduits sans son autorisation.

Research paper thumbnail of Performance of ATM networks under hybrid ARQ/FEC error control scheme

IEEE/ACM Transactions on Networking, 1999

Research paper thumbnail of An affinity analysis based CIM-to-PIM transformation

Multiagent and Grid Systems, 2017

To tackle the problems such as the imperfection and inconsistency in software requirements in tra... more To tackle the problems such as the imperfection and inconsistency in software requirements in traditional Computation Independent Model (CIM) modelling, the low degree of automation as well as the imperfection in the description of Platform Independent Model (PIM) in CIM-to-PIM transforming, in this article, we propose a Business-Process-based CIM modelling method and a CIM-to-PIM transformation approach. Business Process Model is used to express CIM, and UML`s Sequence Diagram, State Chart Diagram as well as Class Diagram are used to express PIM. Firstly, the users' requirements are obtained through business process models. We extract use cases from business processes and create use case specifications. A verification mechanism is also added for the use case specification. Secondly, we transform CIMs into PIMs automatically with use case specifications as the inputs as well as combining with use case based thinking, responsibility based thinking and affinity analysis. Finally, by comparing with the methods in other studies, we conclude that methods proposed in this article can ensure model integrity and increase the degree of model transformation automation.

Research paper thumbnail of Unlocking the Power of OPNET Modeler: Introduction

Research paper thumbnail of A transformation system for maintenance-turning theory into practice

Proceedings Conference on Software Maintenance 1992

A Transformation System for Maintenance - Turning Theory into Practice ... Keith Bennett Tim Bull... more A Transformation System for Maintenance - Turning Theory into Practice ... Keith Bennett Tim Bull Hongji Yang University of Durham England +44 091 386 0420 ... Abstract This paper provides an outline of the prin-ciples and design features of the Maintainer's Assistant. The main ...

Research paper thumbnail of Kestrel-based Search Algorithm (KSA) and Long Short Term Memory (LSTM) Network for feature selection in classification of high-dimensional bioinformatics datasets

Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018

Although deep learning methods have been applied to the selection of features in the classificati... more Although deep learning methods have been applied to the selection of features in the classification problem, current methods of learning parameters to be used in the classification approach can vary in terms of accuracy at each time interval, resulting in potentially inaccurate classification. To address this challenge, this study proposes an approach to learning these parameters by using two different aspects of Kestrel bird behavior to adjust the learning rate until the optimal value of the parameter is found: random encircling from a hovering position and learning through imitation from the well-adapted behaviour of other Kestrels. Additionally, deep learning method (that is, recurrent neural network with long short term memory network) was applied to select features and the accuracy of classification. A benchmark dataset (with continuous data attributes) was chosen to test the proposed search algorithm. The results showed that KSA is comparable to BAT, ACO and PSO as the test statistics (that is, Wilcoxon signed rank test) show no statistically significant differences between the mean of classification accuracy at level of significance of 0.05. However, KSA, when compared with WSA-MP, shows a statistically significant difference between the mean of classification accuracy. Index Terms-kestrel-based search algorithm, deep learning, random encircling, long short term memory network.

Research paper thumbnail of A Three-Dimensional Approach to Evolving Software

2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, 2013

Computing paradigms are becoming ubiquitous and complex in computing tasks, as a computing enviro... more Computing paradigms are becoming ubiquitous and complex in computing tasks, as a computing environment is changing from one dimension to three dimensions to reflect computing tasks changing from scientific computing to ubiquitous computing. By the same principle, software evolution approach should also be a three-dimensional one. Hence a three-dimensional evolution approach is proposed by addressing the relationships among software functions, software qualities and software models. Experiments were carried out to prove the proposed concept, which projects a number of concluding remarks for this study.

Research paper thumbnail of An approach to supporting architecture evolution in Internetware

Proceedings of the Fourth Asia-Pacific Symposium on Internetware - Internetware '12, 2012

ABSTRACT In order to take advantage the Internetware paradigm, software architecture is important... more ABSTRACT In order to take advantage the Internetware paradigm, software architecture is important research subject. Software architecture is the core of software systems and acts as a guideline for many development activities. Currently, not many approaches support the self-adaptability of architecture in Internetware. In this paper, an approach to evolving the software architecture in Internetware is presented, consisting of (1) representing source architecture via graph description and discussing the impact of qualities and functions on architecture, (2) transforming it into the new style via transformation techniques through the verified rules, (3) regenerating the code of the target architecture through the FermaT workbench, and (4) proposing a runtime supporting evolution environment for Internetware based systems.

Research paper thumbnail of A Business-Logic Based Framework for Evolving Software Systems

2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009

In the current competitive market to improve their business processes to act in accordance with t... more In the current competitive market to improve their business processes to act in accordance with the rapid changes. This evolution of the business process normally leads to a change in the employed software systems.Software evolution in general is a lengthy and costly task especially when the documentation of a system is lost, out-dated or unavailable. In this paper a business-logic-based

Research paper thumbnail of Extension of a transformation system for maintenance: dealing with data-intensive programs

Proceedings International Conference on Software Maintenance ICSM-94, 1994

Abstract This paper, following the theme set out in our paper “A Transformation System for Mainte... more Abstract This paper, following the theme set out in our paper “A Transformation System for Maintenance - Turning Theory into Prac-tice” presented in this conference in 1992 [2] - provides more results of the research programme on reverse engineering. It con-centrates on dealing with ...

Research paper thumbnail of Acquisition of ERA models from data intensive code

Proceedings of International Conference on Software Maintenance, 1995

Abstract We describe a solution to the acquisition of Entity Relationship Attribute (ERA) di-agra... more Abstract We describe a solution to the acquisition of Entity Relationship Attribute (ERA) di-agrams from data-intensive source code. In such programs, relationships between data items are often represented within imperative code, as well as within data structures, and we show that ...